Looks like it shows an infected JAR, and leaks info about a Gondvv.class 
which contains the actual malicious stuff.

There's an analysis here:
http://www.deependresearch.org/2012/08/java-7-vulnerability-analysis.html 

I've long felt pretty save on Linux, in spite of these Java vulnerabilities 
- not so anymore. Can anyone recommend a plugin a la FlashBlock but for 
Java, that requires active authorization of an applet before running it?

/Casper

On Monday, August 27, 2012 8:00:18 PM UTC+2, Ricky Clarkson wrote:
>
> Can anyone explain how the Wireshark screenshot relates to the 
> article's content? 
>
> On Mon, Aug 27, 2012 at 2:01 PM, Ben Smith-Mannschott 
> <[email protected] <javascript:>> wrote: 
> > Just a heads-up: 
> > 
> > «A vulnerability in the latest version of Oracle's Java software 
> > framework is under active attack, and the damage is likely to get 
> > worse thanks to the availability of reliable exploit code that works 
> > on a variety of browsers and computer platforms, security experts 
> > warn.» 
> > 
> > 
> http://arstechnica.com/security/2012/08/critical-flaw-under-active-attack-prompts-calls-to-disable-java/
>  
> > 
> > (See article for full text) 
> > 
> > // ben 
> > 
> > -- 
> > You received this message because you are subscribed to the Google 
> Groups "Java Posse" group. 
> > To post to this group, send email to [email protected]<javascript:>. 
>
> > To unsubscribe from this group, send email to 
> [email protected] <javascript:>. 
> > For more options, visit this group at 
> http://groups.google.com/group/javaposse?hl=en. 
> > 
>

-- 
You received this message because you are subscribed to the Google Groups "Java 
Posse" group.
To view this discussion on the web visit 
https://groups.google.com/d/msg/javaposse/-/ZAVob8bzRbYJ.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/javaposse?hl=en.

Reply via email to